Endpoint Protection Made Easy With Privilege Management
- LANGUAGE: English DATE: Wednesday, July 15, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.
Endpoint Privilege Management (EPM) offers capabilities to manage threats associated with local administrative rights on laptops, tablets, smartphones or other endpoints. EPM tools essentially offer controlled and monitored privileged access via endpoints and include capabilities such as application whitelisting for endpoint protection.
Join this webinar and learn:
- Why EDR solutions are not sufficient for endpoint protection?
- What Endpoint Privilege Management is, what it does and why it is important today?
- What the Principle of Least Privilege (PolP) is?
- How an EPM solution can integrate within a global cybersecurity strategy?
- How EPM is implemented in a company, with a case study of one of WALLIX' clients: a European automotive manufacturer?
KuppingerCole Senior Analyst Paul Fisher will explain the benefits of EPM solutions and show how they are superior to mere EDR tools when it comes to protecting endpoints.
He will be joined by Alejandro Soret Madolell, EPM Product Manager at WALLIX, who will focus on EPM Best Practices to secure and neutralize attacks on Endpoints and show how an EPM solution can integrate within a global cybersecurity strategy.
A software company providing cybersecurity solutions, WALLIX is the European specialist in Identity and Access Security Solutions. WALLIX's unified solutions portfolio enables companies to respond to today's data protection challenges. WALLIX solutions guarantee detection of and resilience to cyberattacks, which enables business continuity. The solutions also ensure compliance with regulatory requirements regarding access to IT infrastructures and critical data. The portfolio of unified solutions is distributed through a network of more than 180 resellers and integrators worldwide. Listed on the Euronext (ALLIX), WALLIX supports more than 1,300 organizations in securing their digital transformation. WALLIX is a founding member of the HEXATRUST group and has been included in the Futur40, the first ranking of growth companies on the stock exchange published by Forbes France and is part of the Tech 40 index.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.